Academic literature on the topic 'Information technology – Ethiopia – Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information technology – Ethiopia – Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information technology – Ethiopia – Management"
Okello Jared, Otieno, Stephen Migiro, and Emmanuel Mutambara. "Integrated Financial Management Information System: a conceptual framework for Migori County, Kenya." Public and Municipal Finance 6, no. 1 (April 5, 2017): 37–45. http://dx.doi.org/10.21511/pmf.06(1).2017.04.
Full textGagliardone, Iginio. "The Socialization of ICTs in Ethiopia." International Journal of Sociotechnology and Knowledge Development 1, no. 4 (October 2009): 13–28. http://dx.doi.org/10.4018/jskd.2009062602.
Full textAlemu, Teshome, Tridib Bandyopadhyay, and Solomon Negash. "Electronic Payment Adoption in the Banking Sector of Low-Income Countries." International Journal of Information Systems in the Service Sector 7, no. 4 (October 2015): 27–47. http://dx.doi.org/10.4018/ijisss.2015100102.
Full textBerihun, Getamesay Biyadgilign, and Dereje Teferi. "Developing an Improved ITSM Framework for Ethio Telecom." Journal of Information Systems and Informatics 3, no. 2 (June 25, 2021): 433–55. http://dx.doi.org/10.33557/journalisi.v3i2.145.
Full textMuriithi, Beatrice W., Nancy G. Gathogo, Gracious M. Diiro, Samira A. Mohamed, and Sunday Ekesi. "Potential Adoption of Integrated Pest Management Strategy for Suppression of Mango Fruit Flies in East Africa: An Ex Ante and Ex Post Analysis in Ethiopia and Kenya." Agriculture 10, no. 7 (July 8, 2020): 278. http://dx.doi.org/10.3390/agriculture10070278.
Full textGezahegn, Tafesse W., and Xueqin Zhu. "Marginal value of natural water in agriculture: a study in the suburbs of Mekelle City, Ethiopia." Water Policy 17, no. 2 (August 11, 2014): 316–31. http://dx.doi.org/10.2166/wp.2014.146.
Full textKifle, Mengistu, Fay Cobb Payton, Victor Mbarika, and Peter Meso. "Transfer and Adoption of Advanced Information Technology Solutions in Resource-Poor Environments: The Case of Telemedicine Systems Adoption in Ethiopia." Telemedicine and e-Health 16, no. 3 (April 2010): 327–43. http://dx.doi.org/10.1089/tmj.2009.0008.
Full textFikre, Seyfe. "The Role and Challenge of Ethiopian Commodity Exchange (ECX) on Coffee Supplies and Marketing in Ethiopia." Business and Management Studies 6, no. 3 (September 8, 2020): 1. http://dx.doi.org/10.11114/bms.v6i3.4976.
Full textHaile, Mekbib G., Tesfamicheal Wossen, and Matthias Kalkuhl. "Access to information, price expectations and welfare: The role of mobile phone adoption in Ethiopia." Technological Forecasting and Social Change 145 (August 2019): 82–92. http://dx.doi.org/10.1016/j.techfore.2019.04.017.
Full textKassahun, Teshome. "Adoption of garden coffee production technology package by smallholder farmers in Ethiopia." African Journal of Food, Agriculture, Nutrition and Development 21, no. 05 (July 6, 2021): 17989–8004. http://dx.doi.org/10.18697/ajfand.100.19990.
Full textDissertations / Theses on the topic "Information technology – Ethiopia – Management"
Adem, Lishan. "The impact of information technology in sub Saharan Africa with a particular reference to Ethiopia : a constructionist approach." Thesis, University of Sheffield, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284979.
Full textRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textDe, Jongh Henk. "Information technology outsourcing." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53467.
Full textENGLISH ABSTRACT: The study project examines the concept of information technology (IT) outsourcing to external service providers. It is a relatively new concept in the South African scenario and there are many risks associated with the process that can cause a company to loose large amounts of money if outsourcing is not done right. The study project will aim to examine the most important aspects regarding IT outsourcing in order to reduce the risks associated with the process. The definition of IT outsourcing is the practice of transferring an organisation's computer centre operations, telecommunications networks, or applications development to external vendors of these services. There are different variations of outsourcing applicable to IT, for example: contracting out, outsourcing, in sourcing and co-sourcing. Companies have different reasons for outsourcing and the risks associated with the process have to be taken into account when embarking on an outsourcing initiative. With IT outsourcing there are different services that can be outsourced, for example: mainframe services, desktop computer services, security services and different application services. The decision to outsource a specific area of IT is a strategic issue and the risks, costs, and selection of the service provider are all very important factors to take into account. One of the main factors that any company should take into account when embarking on a big initiative is of course costs. The aim is the reduction of costs of the specific outsourced area. Therefore the necessary measures need to be in place to measure costs before and after the outsourcing process. It could happen that the outsourcing process do not provide the reduced cost benefits envisaged initially. This could be due to hidden costs that were not taken into account when the outsourcing initiative was planned. Normally the outsourcing process is driven by a structured project and numerous important factors need to be taken into account when managing the whole process. The factors include: the vendor evaluation process, setup of the service level agreement, the request for proposal, relationship with the supplier, communication of the whole process inside the company, the contract between the two parties, and the transition period with the measuring of results thereafter. The current IT skills shortage in South Africa is causing companies to rethink their IT strategies and make use of external service providers to supply them with the necessary skills to get the job done. The research illustrates this fact that IT consulting has one of the highest adoption rates currently and with regard to the future. Full blown outsourcing is still a relatively new concept in South Africa and companies will only adopt the concept as soon as it has proved to be successful and cost effective. As mentioned it is important that a structured methodology should be used to drive an outsourcing process. It is important that the approach is structured around proven project management principles with the correct measures in place to support and sustain the whole process. Outsourcing of IT services is a strategic decision that a company must take and the risks associated with the process mean that it must be planned and executed very carefully. Outsourcing has various risks associated with it like the appointment of the wrong service provider. However, the outsourcing process can also have its merits and the most important of these are most probably lower costs, new IT skills, and better service. The shortage of IT skills in South Africa makes the idea of outsourcing more and more attractive because of the fact that companies can now "buy" the skills without having to commit to long term permanent employment contracts for permanent staff.
AFRIKAANSE OPSOMMING: Die navorsingsverslag handel oor die konsep van uitkontraktering van inligtingstegnologie(IT) dienste aan eksterne diensverskaffers. Aangesien dit 'n relatiewe nuwe tendens in Suid Afrika se IT bedryf is, en die risiko bestaan dat 'n maatskappy groot geldelike verliese kan ly indien dit nie reg aangepak word nie, word daar gepoog om na die belangrikste aspekte van uitkontraktering te kyk om die risikos daaraan verbonde so laag as moontlik te hou. Die definisie van IT uitkontraktering is die oordrag van 'n organisasie se rekenaar sentrum operasies, telekommunikasie netwerk, of toepassing ontwikkeling na 'n eksterne verskaffer van hierdie dienste. Daar is verskillende variasies van uitkontraktering van toepassing op IT soos byvoorbeeld: uitkontraktering, inkontraktering, en gesamentlike kontraktering. Maatskappye het verskillende redes om 'n diens uit te kontrakteer en die risikos verbonde aan die proses moet sorgvuldig in gedagte gehou word wanneer die uitkontrakteringsproses aangepak word. Met IT uitkontraktering is daar verskillende dienste wat uitgekontrakteer kan word soos byvoorbeeld: hoofraam dienste, persoonlike rekenaar dienste, sekuriteitsdienste en verskeie rekenaar applikasie dienste. Die besluit om 'n spesifieke area van IT uit te kontrakteer is 'n strategiese kwessie vir die maatskappy en die risikos, kostes en keuse van eksterne diensverskaffer is almal baie belangrike faktore wat in gedagte gehou moet word. Een van die vernaamste faktore wat enige maatskappy in ag behoort te neem wanneer 'n groot inisiatief aangepak word, is natuurlik kostes. Die doel van uitkontraktering is om die kostes van die spesifieke area te verlaag. Daarom moet die nodige maatreëls in plek wees om die kostes vooraf en na die uitkontrakteringsproses te meet. Die uitkontraktering inisiatief kan die maatskappy egter baie duur te staan kom en glad nie die koste voordele bied wat aanvanklik beplan is nie. Dit kan wees as gevolg van verskuilde kostes wat nie met die beplanning van die proses in ag geneem is nie. Gewoonlik word die uitkontrakteringsproses gedryf deur 'n gestruktureerde projek en verskeie belangrike faktore moet in ag geneem word vir die hele proses. Die faktore sluit in: die evaluasieproses om die regte diensverskaffer aan te stel, die opstel van die regte dokumentasie in terme van die diensvoorstel voorlegging, verhouding met die diensverskaffer, die opstel van die diensvlak ooreenkoms, kommunikasie oor die hele proses binne die maatskappy, die kontrak tussen die twee partye, oorgangstadium en die meting van voordele daarna. Die huidige tekort aan IT vaardighede in Suid Afrika veroorsaak dat maatskappye hul IT strategie moet herdink en die opsie van eksterna diensverskaffers wat die nodige vaardighede kan verskaf, oorweeg word. Die studie illustreer hierdie feit dat IT konsultasie een van die hoogste vlakke van ingebruikneming tans en vir die toekoms het. Volledige IT funksie uitkontraktering is nog 'n relatiewe nuwe konsep in Suid Afrika en maatskappye sal slegs die idee aanneem sodra uitkontraktering as suksesvol en koste effektief bewys is. Soos reeds genoem is dit belangrik dat 'n gestruktureerde metodologie gebruik word om 'n uitkontrakteringsinisiatief te dryf. Dit is belangrik dat die aanslag geskoei is rondom bewese projekbestuursbeginsels en dat die regte maatreëls getref is om die proses te ondersteun. Uitkontraktering van IT dienste is 'n strategiese besluit wat 'n maatskappy moet neem. Die risikos daaraan verbonde veroorsaak dat die beplanning en aanpak van die proses baie deeglik en noukeurig gedoen moet word. Uitkontraktering het verskeie risikos soos om die verkeerde eksterne diensverskaffer te kies, maar kan ook voordelig vir die maatskappy wees en die grootste voordele wat 'n maatskappy kan verwag is verlaagde kostes en nuwe IT vaardighede. Die probleem van 'n tekort aan goed opgeleide IT personeel in Suid Afrika maak die idee van uitkontraktering al meer aanlokliker omdat dit 'n goeie manier is om goeie vaardighede in te "koop".
Duffy, Juliet (Juliet Maria). "Information management using Web 2.0 technology." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/50100.
Full textIncludes bibliographical references.
Web 2.0, the ultimate platform for tacit based knowledge work has finally arrived. User driven, collaborative platform based tools including wikis, web mash-ups, discussion boards, linkage based search engines, and tagging have the potential to vastly change how information is managed and how knowledge work is captured. This thesis investigates how the new paradigms and tools of Web 2.0 can be applied to the Pharmaceutical Industry and assist with information management at The Novartis Institute for BioMedical Research (NIBR). Applying Web 2.0 tools to NIBR's chemical compounds, targets, assays, people, and projects in a well thought out framework has the potential to yield tremendous productivity improvements in the drug discovery process. Effectively harnessing the collective intelligence of thousands of scientists within Novartis's worldwide research network will enable a paradigm shift. A large, extremely knowledgeable user community can more effectively annotate metadata, hyperlink to important content, establish tags, and collectively author content. Such activities will not only improve the search ability of information but also allow important scientific connections to emerge linking biology to chemistry and furthering Novartis's understanding of disease.
by Juliet Duffy.
S.M.
M.B.A.
Tessema, Ermyas Arega. "The relation between ICT and poverty reduction : the Central Statistical Agency of Ethiopia." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5275.
Full textENGLISH ABSTRACT: National Statistical offices (NSOs) are the sources of wide ranges of socio-economic, demographic and agricultural data and information that are used to monitor and evaluate development programs and formulate policies. The data generated by NSOs is used as basis for making decisions and also used to assess the extent and causes of poverty. Various stakeholders such as researchers, the World Bank, the International Monetary Fund, the UN, and various NGOs prepare and release research materials and annual reports using data and information obtained from NSOs and line ministries. For example, Deneulin and Shahani state that one of the intentions of the annual Human Development Report (HDR) prepared by the UNDP is “to assess the quality of life of a population and be an advocacy tool for its improvement with a political purpose of raising awareness and generating debate on public issues and concerns which would otherwise not be on the political agenda”1. Based on the different approaches to poverty, different sets of data and information are produced and used for poverty measurement. Mostly, poverty is measured using data obtained from nationally representative household surveys which focus on income and expenditure, ownership, access to and use of some basic services. Another approach uses data on mental satisfaction; still others assume poverty to be multi-dimensional and argue that income alone is not enough. They view poverty as deprivation of basic capabilities due to high rates of mortality, illiteracy, malnourishment, unemployment, ill health, lack of education and social exclusion, etc2. The quality of data and information (such as integrity, methodological soundness, accuracy and reliability, serviceability and accessibility) generated by data-producingagencies therefore needs to be preserved and improved in order to obtain meaningful results from the measurement of poverty in any of the approaches and to satisfy the growing data quality demands of stakeholders. Loshin states that “strategic decisions based on untrustworthy information are likely to result in poor decisions”3. This study focuses on the role played by national statistical offices in poverty reduction in general. It examines the various activities, players, interactions, and ICTs used at the various stages of the statistical process in the Ethiopian Central Statistical Agency (CSA) to generate poverty-related data and information and how the quality of this data can be preserved and improved. The purpose of this research is therefore to identify poverty related data quality problems with respect to the IMF’s DQAF and assess where in the statistical process specific types of ICTs can improve data quality. For this reason interpretive case study method with the researcher as participant observer was adopted to study how poverty related data and information is produced. It was found out that some of the data quality problems can be addressed using appropriate ICTs with the availability of reliable power infrastructures.
AFRIKAANSE OPSOMMING: Nasionale Statistiekkantore (NSOs) is die bron van ‘n wye reeks sosio-ekonomiese, demografiese en landboukundige data en inligting wat gebruik word om ontwikkelingsprogramme te monitor en te evalueer. Die data wat deur NSOs geskep word, word aangewend as grondslag vir besluitneming. Die data word ook gebruik om die omvang en oorsake van armoede te bepaal. Verskeie betrokkenes soos navorsers, die Wêreldbank (WB), Internasionale Monetêre Fonds (IMF) en die VN en NSOs skep en versprei verskillende navorsingsuitsette en jaarverslae wat gebruik maak van die data en inligting wat verkry word van NSOs en ministeries. So konstateer Deneulin en Shahani dat een van die doelstellings van die Verslag op Menslike Ontwikkeling (HDR), soos opgestel deur die VNDP, is om “die lewensgehalte van ‘n bevolking te skat en om as werktuig en voorspraak vir die verbetering daarvan op te tree, met die politiese doelwit om bewustheid te verhoog en debatvoering oor openbare sake en kwessies, wat andersins nie op die agenda sou verskyn nie, aan te voor”.4. Na gelang van die verskillende benaderings tot armoede word verskillende stelle data en inligting geproduseer en gebruik vir die meting van armoede. Armoede word gewoonlik gemeet deur data te gebruik wat bekom word van landswye opnames van huishoudings en ingestel is op inkomste en besteding, besitreg, toegang tot en die gebruik van ‘n paar basiese dienste. ‘n Ander benadering gebruik data oor geestelike bevrediging; ander weer aanvaar dat armoede multidimensioneel is en voer aan dat inkomste alleen nie genoeg is nie. Hulle beskou armoede as die ontbering van basiese vermoëns weens ‘n hoë sterftesyfer, ongeletterdheid, ondervoeding, siekte, gebrekkige onderwys, sosiale uitsluiting en dies meer5. Die gehalte van data en inligting (soos integriteit, metodologiese deeglikheid, akkuraatheid en betroubaarheid, bruikbaarheid en toeganklikheid) wat deur agentskappe opgelewer word moet dus bewaar en verbeter word ten einde ‘n beduidende resultaat te bekom uit die meting van armoede deur enige van die benaderings en ook om belanghebbendes se groeiende aandrang op datagehalte te bevredig. Loshin beweer dat “strategiese besluite gebaseer op onbetroubare inligting waarskynlik swak besluitneming tot gevolg sal hê”.6. Hierdie ondersoek konsentreer op die rol wat gespeel word deur nasionale statistiekkantore in die algemene bekamping van armoede. Dit ondersoek die verskillende aktiwiteite, rolspelers, interaksies en ICTs wat op verskeie stadiums van die statistiese proses deur die Etiopiese Sentrale Statistiekagentskap (CSA) gebruik word om data en inligting oor armoede te skep en hoe die betroubaarheid van data behou en verbeter kan word. Die doel van hierdie navorsing is dus om kwaliteitsprobleme wat verband hou met armoededata ten opsigte van die IMF se DQAF te identifiseer en om te besluit waar in die statistiese proses bepaalde soort ICT’s die gehalte van data kan identifiseer. Om hierdie rede is die interpretiewe gevallestudiemetode aanvaar om te bepaal hoe armoede-verwante data en inligting geskep word. Die slotsom was dat sommige van die probleme in datagehalte aangespreek kan word deur die gebruik van gepaste ICT’s met die beskikbaarheid van betroubare mag-infrakstrukture.
Sezgin, Emre. "Itmem - Information Technology Management Enhancement Model: Assessment Of Information Technology Use In Organizations." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612353/index.pdf.
Full textdevelopment and manufacturing industries which were appraised in or in progress of being appraised in CMMI. The study revealed the benefits and deficiencies of IT use in the company. It also provided information for decision makers about IT value within companies, and demonstrated the effects of best practices and standards over IT use.The reported findings should be valuable assets to researchers studying on IT management and IT use in organizations.
McGee, Mary Jane. "Information Technology Management Strategies to Implement Knowledge Management Systems." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4156.
Full textAral, Sinan. "Essays on information, technology and information worker productivity." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39003.
Full textIncludes bibliographical references.
I examine how information technology (IT) skills and use, communication network structures, and the distribution and flow of information in organizations impact individual information worker productivity. The work is divided into three essays based on the task level practices of information workers at a midsize executive recruiting firm: Essay 1: "Information, Technology and Information Worker Productivity: Task Level Evidence." I develop and econometrically test a multistage model of production and interaction activities at the firm, and analyze correlations among network structure, characteristics of information flow and real economic output. I find that (a) IT use is positively correlated with non-linear drivers of productivity; (b) the structure and size of workers' communication networks are highly correlated with performance; (c) an inverted-U shaped relationship exists between multitasking and productivity such that, beyond an optimum, more multitasking is associated with declining project completion rates and revenue generation; and (d) asynchronous information seeking such as email and database use promotes multitasking while synchronous information seeking over the phone shows a negative correlation. These data demonstrate a strong correspondence among technology use, social networks, and productivity for project-based information workers.
(cont.) Essay 2: "Network Structure and Information Advantage: Structural Determinants of Access to Novel Information and their Performance Implications." I examine relationships between social network structure, information structure, and individual performance. I build and validate a Vector Space Model of information diversity, develop hypotheses linking two key aspects of network structure - size and diversity - to the distribution of novel information among actors, and test the theory using data on email communication patterns, message content and performance. Results indicate that access to diverse, novel information is related to network structure in non-linear ways, and that network diversity contributes to performance even when controlling for the positive performance effects of access to novel information, suggesting additional benefits to network diversity beyond those conferred through information advantage.
(cont.) Essay 3: "Organizational Information Dynamics: Drivers of Information Diffusion in Organizations." I examine drivers of the diffusion of different types of information through organizations by observing several thousand diffusion processes of two types of information -'event news' and 'discussion topics' - from their original first use to their varied recipients over time. I then test the effects of network structure and functional and demographic characteristics of dyadic relationships on the likelihood of receiving each type of information and receiving it sooner. Discussion topics exhibit more shallow diffusion characterized by 'back-and-forth' conversation and are more likely to diffuse vertically up and down the organizational hierarchy, across relationships with a prior working history, and across stronger ties; while news, characterized by a spike in communication and rapid, pervasive diffusion through the organization, is more likely to diffuse laterally as well as vertically, and without regard to the strength or function of relationships. The findings highlight the importance of simultaneous considerations of structure and content in information diffusion studies.
by Sinan Aral.
Ph.D.
Kuan, Chan Hong. "Management of information technology for competitive advantage." Thesis, University of Macau, 1996. http://umaclib3.umac.mo/record=b1636729.
Full textCheng, Man-fai, and 鄭文輝. "Utitlization in information technology in housing management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B4500920X.
Full textBooks on the topic "Information technology – Ethiopia – Management"
Chartered Institute of Management Accountants. Information technology management. London: Financial Training, 1993.
Find full text1945-, Bhaskar Krish, Housden R. J. W, and Chartered Institute of Management Accountants., eds. Information technology management. 2nd ed. Oxford: Butterworth Heinemann, 1990.
Find full textBhaskar, Krish. Information technology management. 2nd ed. Oxford: Heinemann in association with the Chartered Institute of Management Accountants, 1990.
Find full textBurton, Paul F., and J. Howard Petrie. Information Management Technology. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8.
Full textDonna, Hussain, ed. Information technology management. Oxford [England]: Butterworth-Heinemann, 1997.
Find full textW, Housden R. J., ed. Information technology management. 2nd ed. Oxford: Heinemann Professional Pub., 1990.
Find full textFawcett, Phillip. Management of information technology. London: Chartered Institute of Bankers, 1996.
Find full textSchwalbe, Kathy. Information technology project management. 5th ed. Boston, Mass: Thomson/Course Technology, 2007.
Find full textCats-Baril, William L. Information technology and management. Chicago: Irwin, 1997.
Find full textOffice, General Accounting. Information management and technology. Washington, D.C: U.S. General Accounting Office, 1997.
Find full textBook chapters on the topic "Information technology – Ethiopia – Management"
Day, David W. J. "Information Technology." In Project Management and Control, 134–52. London: Macmillan Education UK, 1994. http://dx.doi.org/10.1007/978-1-349-12097-0_10.
Full textTarvin, Patrick. "Information Technology." In Leadership & Management of Machining, 77–84. München: Carl Hanser Verlag GmbH & Co. KG, 2016. http://dx.doi.org/10.3139/9781569906408.006.
Full textAngell, Ian O., and Steve Smithson. "Information technology and information systems." In Information Systems Management, 77–93. London: Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21555-3_5.
Full textFranklin, J. Rod. "Information Technology." In Operations, Logistics and Supply Chain Management, 165–90. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_8.
Full textPaass, Gerhard, Daniel Schneider, and Stefan Wrobel. "Information and knowledge management." In Technology Guide, 276–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-88546-7_53.
Full textCastillo, Francisco. "IT Portfolio Management." In Managing Information Technology, 211–27. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38891-5_9.
Full textBacon, C. James. "Why companies invest in information technology." In Information management, 31–47. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-3208-2_2.
Full textBurton, Paul F., and J. Howard Petrie. "Electronics for microcomputers." In Information Management Technology, 1–13. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8_1.
Full textBurton, Paul F., and J. Howard Petrie. "Implementation and system management." In Information Management Technology, 175–85. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8_10.
Full textBurton, Paul F., and J. Howard Petrie. "Microcomputers: the building blocks." In Information Management Technology, 14–57. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-3206-8_2.
Full textConference papers on the topic "Information technology – Ethiopia – Management"
Gelagay, Habtamu Sewnet. "Geospatial Data Sharing Barriers Across Organizations and the Possible Solution for Ethiopia." In 4th International Conference on Geographical Information Systems Theory, Applications and Management. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006778802690273.
Full textFanta, Getnet Bogale, Leon Pretorius, and Louwrence Erasmus. "Hospitals' Readiness to Implement Sustainable SmartCare Systems in Addis Ababa, Ethiopia." In 2019 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2019. http://dx.doi.org/10.23919/picmet.2019.8893824.
Full text"Accelerating Health Service and Data Capturing Trough Community Health Workers in Rural Ethiopia - A Pre-requisite to Progress." In International Conference on Knowledge Management and Information Sharing. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004135101680177.
Full textTesfaye Ayehu, Getachew. "Land capability mapping with SPOT data and geo-information technology south Gondar, North-Western highlands of Ethiopia." In 2013 Second International Conference on Agro-Geoinformatics. IEEE, 2013. http://dx.doi.org/10.1109/argo-geoinformatics.2013.6621917.
Full textM. Duggal, Sudesh. "Global Information Technology Management." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2470.
Full text"Information technology and management." In 2013 5th Conference on Information and Knowledge Technology (IKT). IEEE, 2013. http://dx.doi.org/10.1109/ikt.2013.6620128.
Full textGalup, Stuart, Jim J. Quan, Ronald Dattero, and Sue Conger. "Information technology service management." In the 2007 ACM SIGMIS CPR conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1235000.1235010.
Full textChhajed, Garvit, Hitesh Jethani, Anagha Pokharkar, Himanshu Bhutani, and Sadhika Jain. "SECURE CRYPTOGRAPHY KEY MANAGEMENT SYSTEM FOR WEB BASED WALLET MANAGEMENT SYSTEM." In ETHICS AND INFORMATION TECHNOLOGY. VOLKSON PRESS, 2020. http://dx.doi.org/10.26480/etit.02.2020.96.98.
Full textKlempa, Mathew J. "Management of information technology innovation." In the 1993 conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/158011.158120.
Full textMalika, Frimeche. "Knowledge management and information technology." In 2014 4th International Symposium ISKO-Maghreb: Concepts and Tools for knowledge Management (ISKO-Maghreb). IEEE, 2014. http://dx.doi.org/10.1109/isko-maghreb.2014.7033479.
Full textReports on the topic "Information technology – Ethiopia – Management"
Bartoszek, Thomas, Barry Gay, John Huddleston, James Mitchell, Alejandra Rodriguez, Vicky Sain, Christopher Scrabis, and Kathryn Truex. Information Technology Management: Management of Information Technology Resources Within DoD. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada432557.
Full textKraynova, O. S. Management of information technology enterprises. Ljournal, 2011. http://dx.doi.org/10.18411/kray-2011-mong-00071.
Full textPratt, Jerry, Jeffrey M. Bradshaw, James Allen, Lucian Galescu, and Niranjan Suri. Naval Automation and Information Management Technology. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada444049.
Full textStoneburner, Gary, Alice Goguen, and Alexis Feringa. Risk management guide for information technology systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-30.
Full textPollock, Neal. Knowledge Management and Information Technology (Know-IT Encyclopedia). Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada407692.
Full textWiding, M. A., D. W. Blodgett, M. D. Braun, M. J. Jusko, J. M. Keisler, R. J. Love, and G. L. Robinson. DOE technology information management system database study report. Office of Scientific and Technical Information (OSTI), November 1994. http://dx.doi.org/10.2172/161564.
Full textAllen, James D. Information Technology Program Management: Is There a Difference? Fort Belvoir, VA: Defense Technical Information Center, June 2014. http://dx.doi.org/10.21236/ada607694.
Full textDavis, Sarah, James Mitchell, Kevin A. Palmer, Liyang Riggins, Kathryn Truex, and Zachary Williams. Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada432754.
Full textHughes, M. J., and P. K. S. Lau. Lockheed Martin Idaho Technologies Company information management technology architecture. Office of Scientific and Technical Information (OSTI), May 1996. http://dx.doi.org/10.2172/423618.
Full textSpetka, Scott E., George O. Ramseyer, and Richard W. Linderman. Grid Technology and Information Management for Command and Control. Fort Belvoir, VA: Defense Technical Information Center, June 2005. http://dx.doi.org/10.21236/ada464154.
Full text